Published: September 17, 2024
Author(s)
Dimitris Simos (SBA Research), Bernhard Garn (SBA Research), Dominik Schreiber (NIST), Manuel Leithner (SBA Research), Richard Kuhn (NIST), Raghu Kacker (NIST)
Conference
Name: International Workshop on Combinatorial Testing (IWCT) 2024
Dates: 05/27/2024 - 05/31/2024
Location: Toronto, Canada
Citation: 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 207-210
In this paper, we present an application of combinatorial security testing to the well-known anonymity network Tor. Rigorous testing of the Tor network is important to evaluate not only its functionality, but also the security it provides to its users. However, such testing efforts are facing challenges including accurate modelling as well as creation of automated and security focused test oracles. We argue that combinatorial test sets fulfilling coverage criteria can be used to enhance and augment currently employed testing approaches of Tor in practice. Results from a case study demonstrate that combinatorial methods are a promising avenue for security testing of the Tor anonymity network client.
In this paper, we present an application of combinatorial security testing to the well-known anonymity network Tor. Rigorous testing of the Tor network is important to evaluate not only its functionality, but also the security it provides to its users. However, such testing efforts are facing...
See full abstract
In this paper, we present an application of combinatorial security testing to the well-known anonymity network Tor. Rigorous testing of the Tor network is important to evaluate not only its functionality, but also the security it provides to its users. However, such testing efforts are facing challenges including accurate modelling as well as creation of automated and security focused test oracles. We argue that combinatorial test sets fulfilling coverage criteria can be used to enhance and augment currently employed testing approaches of Tor in practice. Results from a case study demonstrate that combinatorial methods are a promising avenue for security testing of the Tor anonymity network client.
Hide full abstract
Keywords
combinatorial testing; combinatorial security testing; anonymity network; Tor
Control Families
None selected